Search Results

Search found 37426 results on 1498 pages for 'simple talk editorial team'.

Page 587/1498 | < Previous Page | 583 584 585 586 587 588 589 590 591 592 593 594  | Next Page >

  • What is the best logging solution for a C# .NET 3.5 project?

    - by Odd
    My team is about to start a new enterprise wide ASP.NET development project, quite possibly the largest undertaken by my department so far and the largest project that I've ever worked on. I'm looking for a good logging solution for the system. Firstly, what logging tools are currently available and widely used? Secondly, for an ASP.NET (probably MVC) enterprise applicaiton, which tool is most appropriate based on your experience? So far I've used Log4net almost exclusively for all my previous projects. It's a fantastic tool, however I would like to see if there is anything I've not used out there before I start a project of this magnitude or if there is any reason I would not want to use Log4net for a project of this size.

    Read the article

  • Large quotation marks in Word?

    - by hawbsl
    Is there a simple way in MS Word to get large quotation marks tightly round a paragraph of text, like you might see in print media to mark a quote? If you simply increase the font size of the quote character, it moves too far away from the text it's accompanying. Worse, the first and last lines start to detach from the rest of the paragraph. Here's what I mean (this is Calibri I think): But this is the desired effect (can't do this in Word, had to chop it about in a paint package):

    Read the article

  • Why acegi (Spring Security) converts password to uppercase before comparing ?

    - by Tony
    One of my colleague in QA team reported a bug to me, the bug said that can't change password to lowercase, otherwise login is rejected,using number or uppercase is all fine. The login system was implemented using acegi 1.0 (now called Spring Security). This was a very strange bug,changing password is done by encrypting the user input string into MD5 string, I implemented this without using anything related acegi, I don't if the is the origin cause of the problem. When the login is rejected, through debugging, I find that, the user input is converted into uppercase by acegi when passing to the acegi comparing logic. At first, I didn't believe this, when I checkout the acegi source and debugging with it, I find it does convert both username and password to uppercase (source code line 121), Can you tell me why it does this? This can cause password encoding mismatch!

    Read the article

  • Can I add a file and burn an .iso at once?

    - by Flame
    I just downloaded a Windows 7 iso from MSDNAA at school and they gave me a personal key. I'd like to add a file with my key onto the disc, but it has to remain bootable. Is there a really simple way to do this, or one that doesn't require some shareware? I'm using XP right now, or any solution under ubuntu is fine.

    Read the article

  • Suggestions: Anti-Pattern counter-examples

    - by Tom W
    It doesn't seem that this exact question has been asked before, so I'll fire away: Most of us are familiar with the concept of an anti-pattern. However, avoiding implementation of anti-patterns can in principle swing too far the other way and cause problems itself. As an example, "Design by Committee" has a counter-example that I'd call "Design by Maverick" - wherein the design of an important feature is handed off to an individual to do what they think best, with the intention of reviewing their work later and deciding whether it should be finalised or go through another iteration. This takes much longer in practice as the rest of the team are occupied by other things, and can end up with a feature that's useful to nobody, particularly if the Maverick is not themselves an experienced end-user. Does anyone have any more examples of anti-pattern counter-examples?

    Read the article

  • Is it possible to use Integrated Windows Auth when Server isn't on the domain?

    - by jskentzos
    Our production web servers ARE NOT part of the domain, but we'd like people to be able to log in automatically since they are logged into the domain on their PC. Is there anyway to get the browser (IE7+) to send the appropriate information to the server (IIS6) so I can retrieve the ServerVariables["AUTH_USER"] or ServerVariables["LOGON_USER"]? I presume the answer is no since if I set the security for windows auth to "on" and anonymous access to "off", then the server wouldn't know what do do with any user information for a domain which it has no knowledge of. I just want to know for sure before I give the SSO team a "not possible" answer.

    Read the article

  • regarding like query operator

    - by stackoverflowuser
    Hi For the below data (well..there are many more nodes in the team foundation server table which i need to refer to..below is just a sample) Nodes ------------------------ \node1\node2\node3\ \node1\node2\node5\ \node1\node2\node3\node4 I was wondering if i can apply something like (below query does not give the required results) select * from table_a where nodes like '\node1\node2\%\' to get the below data \node1\node2\node3\ \node1\node2\node5\ and something like (below does not give the required results) select * from table_a where nodes like '\node1\node2\%\%\' to get \node1\node2\node3\ \node1\node2\node5\ \node1\node2\node3\node4 Can the above be done with like operator? Pls. suggest. Thanks

    Read the article

  • C# Compiler should give warning but doesn't?

    - by Cristi Diaconescu
    Someone on my team tried fixing a 'variable not used' warning in an empty catch clause. try { ... } catch (Exception ex) { } - gives a warning about ex not being used. So far, so good. The fix was something like this: try { ... } catch (Exception ex) { string s = ex.Message; } Seeing this, I thought "Just great, so now the compiler will complain about s not being used." But it doesn't! There are no warnings on that piece of code and I can't figure out why. Any ideas? PS. I know catch-all clauses that mute exceptions are a bad thing, but that's a different topic. I also know the initial warning is better removed by doing something like this, that's not the point either. try { ... } catch (Exception) { } or try { ... } catch { }

    Read the article

  • How to run linux bash script from web browser?

    - by sahil007
    Hi I have web server on it also. I had made simple bash script using vi editor..which will open file and then add some lines into it at last it will save automatically...and after that 2-3 linux command will be run as a specific user. Now I want to do the same from web browser...so what I need to do for this? html?perl?python?cgi?....?which is easy way to do the same?

    Read the article

  • How can I set up a load balancer to direct all Search Engine Bot traffic to one server?

    - by Ryan
    We have a simple load balancer set up on Rackspace to 3 web server nodes. After reviewing our traffic and expenses, the largest bandwidth hog is Google Bot. Since on Rackspace we pay for bandwidth by the byte, we'd like to direct all traffic from GoogleBot to another host (MediaTemple) with unlimited bandwidth. We think this would cut our hosting bill several thousand dollars a month. Is this possible? Advisable?

    Read the article

  • How do I manage specs in Scrum ?

    - by this. __curious_geek
    Referring to this buddy question, I want to know how one can manage specs in Scrum process ? I'm facing this problem while assigning tasks to my team for the sprint. Needless to say - I'm new to Agile/Scrum. Currently, we are using our own specs sheet to map StoryId to SpecId and vice versa. I'm getting the felling that Scrum is more about project management [getting things done on time] and you need a seperate process to manage specs and requirements. How do we manage specs in a Scrum process ?

    Read the article

  • some confusions to singleton pattern in PHP

    - by SpawnCxy
    Hi all, In my team I've been told to write resource class like this style: class MemcacheService { private static $instance = null; private function __construct() { } public static function getInstance($fortest = false) { if (self::$instance == null) { self::$instance = new Memcached(); if ($fortest) { self::$instance->addServer(MEMTEST_HOST, MEMTEST_PORT); } else { self::$instance->addServer(MEM_HOST, MEM_PORT); } } return self::$instance; } } But I think in PHP resource handles will be released and initialized again every time after a request over. That means MemcacheService::getInstance() is totally equal new Memcached() which cannot be called singleton pattern at all. Please correct me if I'm wrong. Regards

    Read the article

  • Best way to partition 1TB (Linux&Windows7)

    - by Simon
    Any intelligent way to partition 1TB and be prepared for resizing/adding/deleting partitions? I was thinking about LVM, but as far as i remember, Windows7 can't be installed on logical volume right? For now my plan is: - ~150GB for Windows7 and other stuff (VisualStudio..., maybe I'll split it 100/50 or something like that) - simple NTFS - 850GB = LVM - disk for linux (Ubuntu) and other stuff virtual machines etc. I'm mostly interested in how and what tools should I use to get easy in maintain partitions for both systems.

    Read the article

  • Linux ubuntu wubi

    - by Jamaica Bob
    I would like to install linux ubuntu next to my primary windows 7 OS. I found that wubi ubuntu installer which helps you with simple installation/uninstallation of ubuntu. But the wiki says that wubi uses a virtual disk. Is that similar to virtually running the OS? I really dont want my primary system to slow down because of that. Should i rather go with the classical dual boot? If WUBI, whats the recommended install size? Thanks

    Read the article

  • Extending Windows Desktop using C#

    - by Lijo
    Hi Team, I am trying to customize my Windows XP’s desktop using C# code. This is my first venture of this kind. Could you please point me to some documentation that will Give the names of classes that can be used for extending/customizing Windows’ desktop Some example code What I am trying to do specifically is as follows I am planning to customize the desktop. When I unlock my computer (by entering user name and password) the files should come(by flying) into their required places. Initially the files are to be located in the right end corner. Thanks Lijo Cheeran Joseph

    Read the article

  • Common Programming Jargon

    - by jdk
    What programming terms have you coined (or heard) that have taken off in your own circles (i.e. have heard others repeat it)? It might be within your own team, workplace or garnered greater popularity on the Internet. Write your programming term, word or phrase in bold text followed by an explanation, citation and/or usage example so we can use it in appropriate context. Please no repeats of common jargon already ingrained in the programming culture like: "kludge", "automagically", "cruft", etc. (unless you coined it). Stealing from the comments: "A shared vocabulary is the basis of communication, not just among programmers [...]"

    Read the article

< Previous Page | 583 584 585 586 587 588 589 590 591 592 593 594  | Next Page >